Debian: New phpmyadmin packages fix several vulnerabilities

    Date10 Sep 2007
    CategoryDebian
    3105
    Posted ByLinuxSecurity Advisories
    Several remote vulnerabilities have been discovered in phpMyAdmin, a program to administrate MySQL over the web. The PMA_ArrayWalkRecursive function in libraries/common.lib.php does not limit recursion on arrays provided by users, which allows context-dependent attackers to cause a denial of service (web server crash) via an array with many dimensions.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1370-2                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                            Thijs Kinkhorst
    September 10th, 2007                    http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : phpmyadmin
    Vulnerability  : several
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2006-6942 CVE-2006-6944 CVE-2007-1325 CVE-2007-1395 CVE-2007-2245
    
    The update for the oldstable distribution was incorrectly installed into
    the archive. This update provides corrected packages. For reference the
    original advisory text:
    
    Several remote vulnerabilities have been discovered in phpMyAdmin, a
    program to administrate MySQL over the web. The Common Vulnerabilities
    and Exposures project identifies the following problems:
    
    CVE-2007-1325
    
        The PMA_ArrayWalkRecursive function in libraries/common.lib.php
        does not limit recursion on arrays provided by users, which allows
        context-dependent attackers to cause a denial of service (web
        server crash) via an array with many dimensions.
    
        This issue affects only the stable distribution (Etch).
    
    CVE-2007-1395
    
        Incomplete blacklist vulnerability in index.php allows remote
        attackers to conduct cross-site scripting (XSS) attacks by
        injecting arbitrary JavaScript or HTML in a (1) db or (2) table
        parameter value followed by an uppercase  end tag,
        which bypasses the protection against lowercase .
    
        This issue affects only the stable distribution (Etch).
    
    CVE-2007-2245
    
        Multiple cross-site scripting (XSS) vulnerabilities allow remote
        attackers to inject arbitrary web script or HTML via (1) the
        fieldkey parameter to browse_foreigners.php or (2) certain input
        to the PMA_sanitize function.
    
    CVE-2006-6942
    
        Multiple cross-site scripting (XSS) vulnerabilities allow remote
        attackers to inject arbitrary HTML or web script via (1) a comment
        for a table name, as exploited through (a) db_operations.php,
        (2) the db parameter to (b) db_create.php, (3) the newname parameter
        to db_operations.php, the (4) query_history_latest,
        (5) query_history_latest_db, and (6) querydisplay_tab parameters to
        (c) querywindow.php, and (7) the pos parameter to (d) sql.php.
    
        This issue affects only the oldstable distribution (Sarge).
    
    CVE-2006-6944
    
        phpMyAdmin allows remote attackers to bypass Allow/Deny access rules
        that use IP addresses via false headers.
    
        This issue affects only the oldstable distribution (Sarge).
    
    For the stable distribution (etch) these problems have been fixed in
    version 2.9.0.3-4.
    
    For the old stable distribution (sarge) these problems have been fixed in
    version 2.6.2-3sarge5.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 2.10.1-1.
    
    We recommend that you upgrade your phpmyadmin packages.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge5.dsc
          Size/MD5 checksum:      896 7d2144286ddad9d5a8a88af1660bf34f
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge5.diff.gz
          Size/MD5 checksum:    41685 71832d082f9aad134786fb51c522e5f3
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2.orig.tar.gz
          Size/MD5 checksum:  2654418 05e33121984824c43d94450af3edf267
    
      Architecture independent components:
    
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge5_all.deb
          Size/MD5 checksum:  2769794 b7f2545109e3904bb7e8eb49b09e6f7c
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-4.dsc
          Size/MD5 checksum:     1011 26baccf88fa7d3b00f4802e46d8d0053
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-4.diff.gz
          Size/MD5 checksum:    46886 0f377a70b327c65f53ff6895856d18d6
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1.orig.tar.gz
          Size/MD5 checksum:  3500563 f598509b308bf96aee836eb2338f523c
    
      Architecture independent components:
    
        http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-4_all.deb
          Size/MD5 checksum:  3605594 05f19efce1cb5b31a8f1161a01dbe158
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.